Académique Documents
Professionnel Documents
Culture Documents
Sharing of resources on the cloud can be achievedon a large scale since it is cost
effective and location independent.Despite the hype surrounding cloud computing,
organizations arestill reluctant to deploy their businesses in the cloud
computingenvironment due to concerns in secure resource sharing. In thispaper,
we propose a cloud resource mediation service offered bycloud service providers,
which plays the role of trusted thirdparty among its different tenants. This paper
formally specifiesthe resource sharing mechanism between two different tenants
inthe presence of our proposed cloud resource mediation service.The correctness of
permission activation and delegation mechanismamong different tenants using four
distinct algorithms(Activation, Delegation,Forward Revocation and Backward
Revocation)is also demonstrated using formal verification. Theperformance
analysis suggest that sharing of resources can beperformed securely and efficiently
across different tenants of thecloud.
EXISTING SYSTEM:
Traditional access control models, such as role based access control, are
generally unable to adequately deal with cross-tenant resource access
requests.
Specification level security is difficult to achieve at the user and provider
ends.
The security of the approach was not provided.
PROPOSED SYSTEM:
We use model checking to exhaustively explore the system and verify the
finite state concurrent systems. Specifically, we use High Level Petri Nets
(HLPN) and Z language for the modeling and analysis of the CTAC model.
We present a CTAC model for collaboration, and the CRMS to facilitate
resource sharing amongst various tenants and their users.
We also present four different algorithms in the CTAC model, namely:
activation, delegation, forward revocation and backward revocation.
We then provide a detailed presentation of modeling, analysis and automated
verification of the CTAC model using the Bounded Model Checking
technique with SMTLIB and Z3 solver, in order to demonstrate the
correctness and security of the CTAC model.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
REFERENCE: